"The crown jewel? Your 8-digit gym door PIN is your API password and you most likely didn't set it yourself. The same PIN that hasn't changed since the iPhone 8 was cutting-edge technology."
Interesting to see that AI search was basically turned off during the election time. edit: no the election was later, why we're AI searches basically non-existent mid sept - mid oct?
https://fediverse.observer/stats was the link i noticed some similar trend as you mentioned. scroll down a bit to the monthly graphs and there's a huge dip that coincides with your observation about AI search.
so is there that much "AI Traffic" on the internet, or were people outside doing activism or something? who knows.
Interestingly, I saw a graph of Fediverse posts and servers that were online or offline. The months of September, October and November, there was a sharp dip from like, you know, 15,000 to 5,000 say. And then after November it went back up.
If I remember to look at this comment tomorrow, I will post an image link that I grabbed or post the source info. I asked the person who collected it, or the group who collected it, and I said, hey, what happened there? Why is that huge dip in the graph?
>While we’re publishing the binary images of every production PCC build, to further aid research we will periodically also publish a subset of the security-critical PCC source code.
I expect that they'll publish the attestation source code.
But, basically what will happen is the Verifier will request a certain memory region to be attested, then that region will be hashed and the digest will be sent back to the Verifier. If the memory is different from what is expected, the hash digest will NOT match.
They rely on Trusted Execution Environments and the fact that hash functions are one-way functions.
Verifier -> requests a Prover to attest its software state
Prover -> goes into RoT, verifies authenticity of Verifier (and request), computes hash of attested memory region, sends hash digest
Verifier -> receives digest and compares to known hash
> What’s stopping remote endpoint always responding “yes”
The attestation code is inside of a RoT, so a bad actor shouldn't be able to call this code, only callable by receiving a request from a Verifier
"The crown jewel? Your 8-digit gym door PIN is your API password and you most likely didn't set it yourself. The same PIN that hasn't changed since the iPhone 8 was cutting-edge technology."
Reads directly from ChatGPT